I read this whitepaper http://pastebin.com/Dg5wWSAm from anonsec. It explains each steps of how they managed to control a drone remotely. It is really interesting and I find real cases way more educational (they explain better than the theory/dedicated vulnerable web applications). I was wondering if anyone had other cases like this: they explain each steps on how they exploited a device? It is not to copy but to really understand in a real scenario, how they apply their knowledge and actually manage to gain root access, servers, web apps, etc.. Thanks peops =)
Forum Thread: Looking for whitepapers (real case/scenario)
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
2 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
5 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
6 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
7 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
7 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
10 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
10 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
10 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 1 (Getting Started)
-
How To: Find Passwords in Exposed Log Files with Google Dorks
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Use SpiderFoot for OSINT Gathering
-
How To: Wardrive with the Kali Raspberry Pi to Map Wi-Fi Devices
-
Hack Like a Pro: Finding Potential SUID/SGID Vulnerabilities on Linux & Unix Systems
-
How To: Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux
-
How To: Hack 5 GHz Wi-Fi Networks with an Alfa Wi-Fi Adapter
-
How To: Write Your Own Bash Script to Automate Recon
-
How To: Create & Obfuscate a Virus Inside of a Microsoft Word Document
-
How To: MagSpoof Digitally Clones the Magnetic Stripe of Any Credit Card
-
Hack Like a Pro: How to Conduct a Simple Man-in-the-Middle Attack
-
Hack Like a Pro: How to Spoof DNS on a LAN to Redirect Traffic to Your Fake Website
-
How To: Use Upip to Load MicroPython Libraries onto a Microcontroller Over Wi-Fi
-
Hack Like a Pro: Using the Nmap Scripting Engine (NSE) for Reconnaissance
-
Hack Like a Pro: Digital Forensics Using Kali, Part 2 (Acquiring a Hard Drive Image for Analysis)
7 Responses
On the Blackhat conference website you can find papers to the talks that were held.
Yes someone told me to search for this : filetype:pdf site:media.blackhat.com <"optional topic of interest">
'Web Application Hackers Handbook" has a bunch of examples. I've purchased the book and it is amazing. It will tell you everything you need to know plus real life examples of attacks. From what I hear you might be able to download it from the net for free by searching for the name of the book plus 'pdf' at the end.
I have the 2nd one at home xD
nice. me 2. that's the one I meant. I never really paid attn to reading the real scenarios before but I was last night and they were quite good.
Sans.org has a lot of papers too under reading room!
Thank, found them =)
Share Your Thoughts